Visible to the public Secure Transmission Protocol for the IoT

TitleSecure Transmission Protocol for the IoT
Publication TypeConference Paper
Year of Publication2017
AuthorsHsueh, Sue-Chen, Li, Jian-Ting
Conference NameProceedings of the 3rd International Conference on Industrial and Business Engineering
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5351-9
Keywordscompositionality, Information security, Internet of Thing, policy, policy-based collaboration, privacy, protocol verification, pubcrawl, transmission protocol
Abstract

Deploying Internet of Things (IoT) applications over wireless networks has become commonplace. The transmission of unencrypted data between IOT devices gives malicious users the opportunity to steal personal information. Despite resource-constrained in the IoT environment, devices need to apply authentication methods to encrypt information and control access rights. This paper introduces a trusted third-party method of identity verification and exchange of keys that minimizes the resources required for communication between devices. A device must be registered in order to obtain a certificate and a session key, for verified identity and encryption communication. Malicious users will not be able to obtain private information or to use it wrongly, as this would be protected by authentication and access control

URLhttps://dl.acm.org/citation.cfm?doid=3133811.3133824
DOI10.1145/3133811.3133824
Citation Keyhsueh_secure_2017